|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 16:55 |
Online |
Online |
Evaluation on Biometric Template Protection System Based on Somewhat Homomorphic Encryption Hiroto Tamiya, Toshiyuki Isshiki, Kengo Mori (NEC), Satoshi Obana (Hosei Univ.), Tetsushi Ohki (Shizuoka Univ.) ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26 |
Many biometric template protection systems have been proposed to perform biometric authentication while keeping the biom... [more] |
ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26 pp.68-73 |
ISEC |
2020-05-20 13:30 |
Online |
Online |
[Invited Talk]
Almost Optimal Cheating-Detectable (2,2,n) Ramp Secret Sharing Scheme (from CANDAR 2019) Tomoki Agematsu (NEC), Satoshi Obana (Hosei univ) ISEC2020-6 |
In this research, we consider a strong ramp secret sharing scheme (SSS for short) that can detect cheating. A cheating-d... [more] |
ISEC2020-6 p.27 |
ISEC, IT, WBS |
2014-03-11 14:10 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Secret Sharing Schemes Secure against Rushing Adversaries Satoshi Obana (Hosei Univ.) IT2013-87 ISEC2013-116 WBS2013-76 |
[more] |
IT2013-87 ISEC2013-116 WBS2013-76 pp.209-214 |
IT, ISEC, WBS |
2012-03-02 09:25 |
Kanagawa |
|
Software Implementation of Privacy Preserving Statistical Computations based on Homomorphic Encryption Toshiyuki Isshiki, Satoshi Obana, Kengo Mori (NEC) IT2011-68 ISEC2011-95 WBS2011-69 |
(To be available after the conference date) [more] |
IT2011-68 ISEC2011-95 WBS2011-69 pp.135-140 |
VLD |
2010-03-12 15:00 |
Okinawa |
|
An ASIC implementation of a group signature algorithm using two-level behavioral synthesis Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako (NEC) VLD2009-128 |
We implemented a group signature algorithm, which enables anonymous digital signature, into an ASIC. To the best of the... [more] |
VLD2009-128 pp.175-180 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 09:55 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Architecture Optimization of a Group Signature Circuit Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC) |
Group signature scheme is one of the most active research area in recent cryptographic algorithms/applications. Typical... [more] |
ISEC2008-40 pp.37-44 |
ISEC |
2006-09-13 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys Jun Furukawa (NEC), Nuttapong Attrapadung (Tokyo Univ.), Satoshi Obana (NEC) |
We propose a black-box traitor revocable broadcast encryption
scheme. This is a variant of a broadcast encryption schem... [more] |
ISEC2006-80 pp.61-68 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|